CH .
15 NETWORKING CONCEPTS
ONE MARK MCQ QUESTIONS:-
1. UDP stands for .
a. User Data Power b) User Datagram Protocol
c) Uniform data protocol d) User protocol
2. HTTP stands for
a. Hyper Text Transfer Protocol b) High Text Transfer Protocol
c)Hyper Text Transmission Protocol d) Hyper Text Trivial Protocol
3. URL stands for
a. Uniform Resource Location b) Uniform Resource Locator
c) Uniform Reservation Location d) Uniform Road Location
4. is the process of efficiently selecting a path in a network along which the data
packets will travel their destination.
a. Routing b) bridging c) switching d) NIC
5. Address refers to the unique physical address to each NIC card assigned by NIC
manufacture.
a. NIC b) NAC c) MAC d) MIC
6. Most commonly used transmission media in wireless networks are.
a. Microwave b) Radio wave c) Satellite wave d) All of these
7. Most commonly used transmission media in wired networks are.
a. Twisted pair cable b) Co-axial cable c) Optical-fiber d) All of these
8. is a device that connects dissimilar networks.
a. Gateway b) Bridge c) Hub d) Switch
9. __is a phenomenon that connects the things (smart devices) to the internet over wired or
wireless connections.
a. FM b) RFID c) IoT d) AM
10. On a channel each interface serves as both transmitter and receiver but only
one interface can transmit at a time.
a. Simplex b) Half-duplex c) Full-duplex d) None of these
11. can be classified by frequency and wave length
a. Radio wave b) IR rays c) Micro wave d) All of these
12. is host computer that requests for some services from a server
a. Peer to peer b) client - server c) client d) server
13. is a computer on the network that facilitate the sharing of data, software and
hardware resources
a. Peer to peer b) client - server c) client d) server
14. A work station that can be doubled up as a server and client is known as
a. Client b) server
c) dedicated server d) non-dedicated server
15. may have a geographical area up to 1km
a. LAN b) WAN c) MAN d) PAN
16. A refers to a pre-decided set of rules using which all parties of a network
connect and interact with one another
a. VOIP b) Protocol c) HTTP d) SLIP
17. is not a component of computer network
a. HUB b) Router c) switch d) Volt meter
18. is attached to a host so as to establish network connections.
a. Cable b) LAN c) NIC d) WAN
19. The networks spread across countries or on a very big geographical area
a. LAN b) WAN c) MAN d) PAN
20. refers to all the legal and regulatory aspects of Internet and World Wide Web.
a. Cyber law b) Criminal law d) Police law d) online law
21. Server exclusively used for serving files related requests are called .
a. Print server b) Cache memory c) file server d) none of these
22. Which of the following is not a type of network
a) LAN b) MAN c) PAN d) WAN
23. What does the ancronyn for MAN stands for ________
a) magnetic access network b) metropolitan area network
c) multi area network d) multi access network
24. What does the ancronym for LAN stands for _________
a) local area network b) large area network
c) list area network d) line area network
25. Which of the following is the first computers network?
a) TCP/IP b) TELNET c) ARPANET d) INTERNET
26. Which protocol handles the address part of each pocket to that it sends to the exact destination?
a) TCP b) HTTP c) IP d) PPP
27. Privately owned network are confined to a localized area called ______
a) LAN b) WAN c) CAN d) MAN
28. In which toplogy all computers are connected through single hub?
a) ring to pology b) mesh topology c) star topoplgy d) bustopology
29. Which of the following is not example for guide media
a) UTP b) satellite c) coaxial cable d) optical fiber
30. Expand GRPS ______
a) general packet radio service b) general process radio system
c) general packet radio system d) general program radio service
31. Where is a hub specified in the OSI model.
a) session layer b) physical layer c) data link layer d) application layer
32. How many layers are there in OSI model?
a) 3 b) 4 c) 6 d) 7
33. Which one is not a type of protocol?
a) TCP/IP b) HTTP c) SMTP d) TTP
34. Expand OSI __________
a) open system interconnection b) open service internet
c) open source internet d) none of the above
35. Indentify the layer which provides service to the user
a) session layer b) application layer c) presentation error d) physical layer
36. What is hub?
a) software b) computing device c) network device d) calculating device
37. A software and coding which is freely available on internet is ________
a) community software b) free software
c) open-source software d) unclinsed software
38. What does URL stands for?
a) uniform resources locator b) uniform resources latch
c) universal resource locator d) universal resource latch
39. Which is not a type of e-commerce?
a) B2B b) B2C c) B2D d) C2B
40. Which of the following is an example for full duplex communication mode?
a) television broadcasting b) walkie – talkie
c) internet browing d) modern telephone system
41. Which networking device is used to connect two networks together?
a) Hub b) bridge c) switch d) repeaters
42. CDMA stands for __________
a) common division multiple access
b) common data multiple access
c) code division multiple acces
d) none of the above
43. Which of the following is not a type of virus
a) Macro virus b) micro virus
c) file virus d) network virus
TWO MARK QUESTIONS
1. List the goals for networking?
a). The goals for networking are:
i. Resource sharing ii. Reliability iii. Cost factor iv. Communication medium.
2. What do you mean by transmission modes?
a). The way of transmitting data from one place to another using transmitting media is called transmission
mode. This can be done in two ways.
1. Serial mode. 2. Parallel mode.
3. Which is the switching technology used?
a). Circuit switching, packet switching and message switching are used to provide communication between
two computers.
4. What is SIM card?
a). SIM is a tiny chip that gives a cellular device its unique phone number, memory, process and the ability to
interact with the user.
5. What is network security?
a). Network security is an over-arching term that describes that the polices and procedures implemented by a
network administrator to avoid and keep track of unauthorized access, modification of the network and
network resources.
6. What are the advantages of EDGE?
a). EDGE-enhanced data rates for global evolution.
The advantages of EDGE are:
i. specially developed to meet the bandwidth needs of 3G.
ii. EDGE formally called GSM384.
iii. EDGEs are ratio based mobile high speed standards.
iv. it allows data transmission speech of 384 kbps is achieved when all eight time slots are used.
vii. Even higher speed may be possible like 48kpbs per time slot in good ratio conditions.
THREE MARK QUESTIONS
1. Explain the HTTP?
a). i. The hypertext transfer protocol is an application level protocol.
ii. HTTP allows an open-ended set of methods to be used to indicate the purpose of a request.
iii. By the Uniform Resource Locator(URL) for indicating the resource on which a method is to be
applied.
2. Classify and explain servers?
a). Servers can be of two types:
1. Non-dedicated servers 2. Dedicated servers
Non-dedicated servers: A computer works as a work station and as well as a server, it is slower, and
requires more memory. The network uses such servers known as PEER-TO-PEER networks.
Dedicated servers: A computer reserved to help work stations for access data, software and hardware
resources. Ex: File server, Printer server, and Modem servers.
3. Explain the types of networking?
a) Networks are classified into three types on the basis of geographical spread ,they are
*Local area network (LAN)
*Metropolitan area network (MAN)
*Wide area network (WAN)
LAN: Small computer networks that are conformed to a localized area are known as LANs.
The key purpose is to serve its uses in resource sharing.
MAN: MANs are networks spread over a city. The purpose of MAN is the sharing of the hardware and the
software resources among its users.
WAN: WAN is a group of computers that are separated by large distances and ties together. WAN spreads
across the countries. It facilitates fast and efficient exchange of information at lesser cost and higher speed.
4. What are the different networking techniques?
a). There are three different networking /switching techniques which are employed to provide
communication between two computers, they are
1. Circuit switching 2. Message switching 3. Packet switching
Circuit switching: In this technique, first the complete physical connection between two computers is
established and then data are transmitted from source to destination computer in unbroken path.
Message switching: This technique is also called as store and forward method. In this there is no need to
establish a dedicated path between two stations. The message which is sent by a station will get transmitted
through the network from node to node.
Packet switching: In this method a message is broken into small parts called packets. Each packet is tagged
with appropriate source and destination address. These packets transmit through multiple paths and search the
destination.
5. Explain the cables and different types of cables used in transmission?
a) Cables are the physical infra sturcture components that carry data from one computer to another. The
different types of cables used in transmission are
*Twisted pair cables *Coaxial cables *Fiber optical cable
Twisted pair cables and Coaxial cables carry signals in the form of electrical current.
Fiber optical cable carries signals in the form of light.
6. Write the differences between simplex, half duplex, and full duplex?
a) Simplex:
1. The communication is uni-directional.
2. One of the communicating devices can only send data, where as the other can only receive it.
3. Communication is fast because full bandwidth of channel used for transmission.
b) Half duplex:
1. The communication is bi-directional.
2. Both devices can transmit data but not at the same time.
3. This requires a definite turn around time, during which the device changes from the receiving mode to
the transmitting mode.
4. Due to this delay, communication is slower.
c). Full duplex:
1. The communication is bi-directional.
2. Both devices capable of sending as well as receiving data at the same time.
3. The bandwidth of the wire for the data is divided into two channels for carrying data in either
direction.
4. Communication is faster.
7. Explain the applications of network?
a) Network applications:
1. Group Wave :
1. Video conferencing: This is the process of conducting a conference between two or more
participants at different sites by using computer networks to transmit audio and video data.
2. Chatting: it is a real time communication between two users via computer. The two computers
must be online for a chat to be initialed.
3. Email: This allows the user to type messages at their local nodes and then sent to same one on the
network.
4. File transfer: This application facilitates transfer of files from one computer to another.
Uploading: This is obtaining of files from a workstation to a server.
Downloading: this is obtaining files from a server to a workstation or client.
FIVE MARK QUESTIONS
1. Explain the working of OSI and TCP/IP model?
a). The open systems interconnection (OSI) model is a conceptual model that characterized and standardizes
the internal functions of a communication system by partitioning it into abstract layers. They are Layers
Application Layer
Presentation Layer
Session Layer
Transport Layer
Network Layer
Data link Layer
Physical Layer
The physical layer: It is connected with transmitting raw bits over a communication channel.
Data link layer: It provides a reliable link between two directly connected nodes, by deleting and possibly
correcting errors that may occur in physical layer.
Network layer: It controls the operations of the subnet. The main function is to determine how
packets/datagram is routed from source to destination.
Transport layer: It keeps the track of all the segments and retransmits those that fail. It creates packets out of
the message received from the application layer.
Session layer: It controls the connection between computers. It establishes messages and terminates the
connections between the local and remote application.
Presentation layer: It is concerned with the syntax and semantics of the information transmitted, concerned
with moving bits among the layers.
Application layer: This layer functions typically include identifying communication partness, determining
resource availability and synchronizing communications.
TCP/IP model: TCP/IP protocols map to a four layer conceptual model known as the DARPA model.
Application
Transport
Network
interface
Internet
(Department of Defense Advanced Resources Projects Agency model).
Each layer in DARAP model corresponds to one or more layers of the seven layers OSI model.
Network Interface layer: It encompasses the data link and physical layers of the OSI model. It handles placing
TCP/IP packets on the network medium and receiving TCP/IP packets of the network medium.
Internet layer: It encompasses the network layer of OSI model. It handles addressing packing and routing
functions. The core protocols of the internet layer are IP, ARP, ICMP and IGMP.
IP: internet protocol ARP: Address Resolution protocol
ICMP: internet Control Message protocol IGMP: Internet group management protocol.
Transport layer: It encompasses the responsibilities of the OSI transport protocol. It handles providing the
application layer with session and datagram communication services. The core protocols are transmission
control protocol (TCP) and user datagram protocol (UDP).
Application layer: It allows the applications to access the services of the other layers and defines the protocols
that applications used to exchange data. Common protocols are HTTP, FTP etc.
2. Explain various networking devices used?
a). In functioning of networks many devices play important roles few of them are
Modem: A device that converts digital signals to analog signals and vice-versa.
Workstations: All the user computers connected to a network are called workstations.
Network Interface card: A circuit board that controls the exchange of data over a network.
Bridge: A device that connects two LANs and controls data flow between them.
Repeater: A device used to boost the signal. Router: A device that works like a bridge but can handle different
protocols.
Switch: A device that provides a central connection point for cables form workstations, servers and
peripherals.
3) What is topology? Explain in detail?
a). A topology is the actual appearance or layout of networking. Some of the most popular topologies are:
Bus Topology: The linear bus topology connects all the nodes to a single length of transmission medium. The
transmission of data will be in both directions.
Star Topology: In star network each node is connected directly to the central node by a single path. All
communications between nodes have to be passing through central node.
Ring topology: In a ring network all nodes are connected to a common cable and communication is always in
one direction. The data being transmitted is passed through each node in the ring.
Mesh: In this topology, each node is connected to more than one node to provide an alternative root in the
case the host is either down or too busy.
Tree topology: It consists of group of star configured workstations connected to a linear bus backbone cable.
4.What is gateway? Explain?
a). * A gateway is actually a node on a network that serves as an entrance to another network.
*A gateway is also associated with both a router and a switch.
*In homes the gateway is internet service provides (ISP) that connects the user to the internet.
* It enterprises, that the gateway is the computer that routes the traffic from a work station to the outside
network, that is serving the webpage.
*In enterprises, the gateway node often acts as a proxy server and a firewall.
*proxy server: A machine that is not actually a server but appears as a server.
*firewall: A system designed to prevent unauthorized access to or from a private network.
5. Explain network security in detail?
a). Network security consists of the provisions and policies adopted by network administrator to prevent and
monitor unauthorized access, misuse, modification or denial of a computer network and network resources.
Protection Methods:
Authorization: If the user is able to provide a legal login Id/password, then considered as authorized.
Authentication: It involves accepting credentials from the entity and validating them against an authority.
One-factor Authentication: User name and password.
Two factor Authentication: User name and password & security tokens, TM cards/mobile phone.
Three factor Authentication: User name and password/finger print/retinal scan.
Firewall: Once authenticated a firewall enforces access policies such as what services are allowed to be
accessed by the network users.
Security management: Security management for networks is difficult for all kinds of situations. A home or
small office may only require basic security while large business may require high maintenance, advanced
software and hardware to prevent malicious attacks from hacking and spooling.
6. Give the measures for preventing virus?
a) Virus prevention is not a difficult task. By taking by taking extra care and by following the guidelines we
can system virus free.
Guidelines are:
Never use a foreign or cd without scanning it for virus.
Always scan files down load from the internet or other source.
Never boot a pc from a disk unless you find a disk is virus free.
Write protects your disk.
Use licensed software’s.
Use password for pc to prevent unauthorized users
Install and use antivirus software
Keep antivirus software up to data.
Key Answers:-
1 2 3 4 5 6 7 8 9 10
b a b a c d d a c b
11 12 13 14 15 16 17 18 19 20
a c d c a b d c b a
21 22 23 24 25 26 27 28 29 30
c c b a c a a c b a
31 32 33 34 35 36 37 38 39 40
b d d a b c b a c d
41 42 43
a c a
1. Interconnection of autonomous computer is called
a) Internet b) Hotspot c) Wi-Fi d) Network
2. ARPANET stands for
a) Advanced Report Projects Agency Network
b) Advanced Report Projects Agent Network
c) Advanced Report Projects Area Network
d) Advanced Research Projects Agency Network
3. OSI stands for
a) Open system Integrated b) Open source interconnection
c) Open system Internet d) Online system interconnection
4. is concerned with transmitting raw bits
a) Application layer b) Presentation layer c) Networking layer d) Physical layer
5. contains a variety of protocols
a) Physical layer b) Presentation layer c) Transporting layer d) Application layer
6. layer concerned with syntax and semantics of the information.
a) Presentation b) Network c) Transport d) Physical
7. Layer controls the operation of the subnet.
a) Application b) Transport c) Network d) Physical
8. Layer is to accept data from above layer and split it up into smaller units
a) Transport b) Session c) Network d) Presentation
9. IP stands for
a) Internet protocol b) Internet process
c) Interconnection process d) Interspace protocol
10. HTTP stands for
a) Hypertext transfer protocol b) High text transfer protocol
c) High text typing process d) Hyper texting text process
11. is the standard protocol to transfer any types of files
a) FTP b) SLIP c) PPP d) LAN
12. SLIP stands to
a) Serial line internet protocol b) Serial line interconnection protocol
c) Serial line interspace process d) Server line internet protocol
13. PPP stands for
a) Point to point process b) Process to point process
c) Point to process point d) Point to point protocol
14. is a client / server software program
a) Interconnection b) Independent
c) Interspace d) Internet
15. Server can be of types dedicated server and non – dedicated server
a) 2 b) 4 c) 3 d) 5
16. LAN stands for
a) Local area network b) Loss area networking
c) Local architecture network d) Local across network
17. The networks spread across the countries are known as
a) MANs b) LANs c) WANs d) WAN
18. Appearance or layout of a network is called
a) Internet b) topology c) Interconnection d) Session
19. topology consists of a single length of transmission medium into which
the various nodes are attached.
a) Star b) Ring c) Mesh d) Bus
20. topology is the combination of bus and star topology.
a) Root b) Branch c) Tree d) Mesh
21. refer to the computer that are attached to a network and are seeking to
share the resource of the network.
a) Client b) Nodes c) Server d) All the above
22. is an application level protocol with the lightness and speed necessary for
distributed, collaborative, hypermedia information system.
a) FTP b) IP c) HTTP d) TCP
23. is a layered set of protocol
a) IP b) HTTP c) FTP d) PPP
24. The layer allows users on different machines to establish sessions
between them.
a) Application b) Presentation c) Physical d) Session
25. MIME stands for
a) Mail interconnected multi electronics b) Mail internet mail electric
c) Multipurpose internet mail extensions d) Multipurpose interspace mail extensions
26. UTP stands for
a) Universal twisted pair cable b) Universal tested pair cable
c) Unshielded twisted pair cable d) Upper twisted process cable
27. DGM stands for
a) Data grade medium b) Data general medium
c) Digital grade medium d) Digital general medium
28. is used to segment networks into different sub networks
a) Bridge b) Switch c) Shielded d) Network
29. A is a device that lets you link two similar type networks together
a) Switch b) Bridge c) Router d) Hub
30. On small networks, a workstation that can double as a server is known
a) Dedicated server b) Non – dedicated server
c) Dedicated client d) Non – dedicated client
31. LCP stands for
a) Loss control process b) Link control protocol
c) Least control process d) Load control protocol
32. topology, nodes are connected together in an arbitrary fashion.
a) Tree topology b) Ring topology c) Graph topology d) Mesh topology
33. The transmission making use of radio frequency is termed as
a)Radio wave b) Micro wave c) Satellite wave d)None of these
34. A is a device that can handle different protocols
a) Bridge b) Router c) Gateway d) Physical
35. A is a hardware device used to connect several computers together.
a) Network b) System c) Protocol d) Hub
36. is a device that amplifies a signal being transmitted on the network
a) Repeater b) Bridge c) Gateway d) Switch
37. SMS stands for
a) Super message service b) Short message service
c) Short message sending d) Sending more service
38. Sim typically have memory from
a) 15 to 84kb b) 20 to 64kb c) 25 to 84kb d) 16 to 256kb
39. SIM stands for
a) Super internet message b) Subscriber identity module
c) Short internet message d) Slow internet module
40. Wimax can provide broadband wireless access upto 30 miles for
a) Fixed station b) Wireless c) Identity d) Cookies
41. are messages that a web server transmits to a web browser so that a web
server can keep track of the user’s activity on a specific web site.
a) Crackers b) Hackers c) Cookies d) Virus
42. The are malicious programmers who break into secure systems.
a) Crackers b) Network c) Topologies d) Network
43. is a malicious program that requires a host and is designed to make a
system sick
a) Quick heal b) Computer virus c) Kaspersky d) K7
44. Wi – Fi refer
a) Wireless fixing b) Wireless fidelity c) Wired fixing d) None of the above
45. Radio wave can be classified by frequency and
a) Width b) Velocity c) Wavelength d) Length
46. The transmission used direct line – of – slight
a) Circuit b) Infrared c) Switch d) Laser
47. allow you to combine the power of your digital computer with the global
reach of the telephone system.
a) Modem b) Telephone c) Circuit d) Switch
48. A is a device that connects dissimilar networks.
a) Bridge b) Gateway c) Router d) All the above
49. is meant to server subscribers at homes or offices.
a) WLL b) WLC c) GSM d) SIM
50. A is a live, visual connection between two or more people residing in
separate locations for the purpose of communication.
a) PPP b) OSI c) SMS d) VC
51. A is a venue that offers wi – fi access.
a) Wi – fi b) Chat c) VC d) Wi Max
52. The GSM standard for digital cell phones was established in Europe in the mid
a) 1960 b) 1975 c) 1980 d) 8019
53. The in wireless networks refers to the “generation” of the underlying
wireless technology.
a) G b) B c) M d) N
54. The technology is providing up to 25 Mbps connectivity speed.
a) 2G b) 4G c) 3G d) 5G
55. form the most secure level of authorization.
a) Bio metric system b) Firewall c) Authorization d) Authentication
56. applies security mechanisms when a connection is established.
a) Proxy server b) Application gateway
c) Packet filter d) Circuit level gateway
57. In India the cyber laws are contained in the information technology act, 2000 which was
notified on October 2000.
a) 15 b) 17 c) 20 d) 10
58. virus use protocols and commands of computer network to spread themselves on
the network.
a) Macro b) File infectors c) Network d) Boot sector
59. is more commonly known today is a computing platform widely used by IT
service companies.
a) Cloud Technology b) Python c) C++ d) Network
60. form of coaxial cable is thinner and it can have maximum segment
length of 185 meters.
a) Thick net b) UTP cable c) Co axial d) Thin net
61. is the basis for most internal office telephone wiring.
a) VGM b) DGM c) HTTP d) IP
62. A variation of bus topology is the topology.
a) Ring b) Tree c) Mesh d) Root
63. The purpose of a is also sharing of the hardware and the software
resources among its users.
a) LAN b) WAN c) MAN d) Network
64. Dedicated server is known as server.
a) Printer b) Modem c) File d) Non – dedicated
65. was the first protocol for relaying the IP packets over dial – up lines.
a) FTP b) SLIP c) MIME d) URI
66. A is a physical thing, appearing on an Ethernet or some wire.
a) Session b) ARPANET c) Transport d) Packet
67. A is a unit of data, which is what the protocols deal with
a) Data link b) Data gram c) Physical d) Application
68. is the base communication protocol of the internet.
a) TCP b) HTTP c) FTP d) PPP
69. sharing provides sharing and grouping of data files over the network.
a) Print b) File c) Email d) Scanner
70. The layer is used to transform a raw transmission facility into a line that
appears free of undetected transmission errors to the network layer.
a) Application b) Physical c) Data link d) Session
KEY ANSWERS
1. d) Network
2. d) Advanced Research Projects Agency Network
3. d) Online system interconnection
4. d) Physical layer
5. d) Application layer
6. a) Presentation
7. c) Network
8. a) Transport
9. a) Internet protocol
10. b) High text transfer protocol
11. a) FTP
12. a) Serial line internet protocol
13. d) Point to point protocol
14. c) Interspace
15. a) 2
16. a) Local area network
17. c) WANs
18. b) Network
19. d) Bus
20. c) Tree
21. b) Nodes
22. c) HTTP
23. a) IP
24. d) Session
25. c) Multipurpose internet mail extensions
26. c) Unshielded twisted pair cable
27. a) Data grade medium
28. b) Switch
29. d) Hub
30. b) Non – dedicated server
31. b) Link control protocol
32. d) Mesh topology
33. a) Radio wave
34. c) Gateway
35. d) Hub
36. a) Repeater
37. b) Short message service
38. d) 16 to 64kb
39. b) Subscriber identity module
40. a) Fixed station
41. c) Cookies
42. a) Crackers
43. b) Computer virus
44. b) Wireless fidelity
45. c) Wavelength
46. d) Laser
47. a) Modem
48. b) Gateway
49. a) WLL
50.
51.
52. c) 1980
53. a) G
54. d) 5G
55. a) Bio metric system
56. d) Circuit level gateway
57. b) 17
58. c) Network
59. a) Cloud Technology
60. d) Thinnet
61.
62. b) Tree
63. c) MAN
64. c) File
65. b) SLIP
66. d) Packet
67. b) Data gram
68. a) TCP
69. c) Email
70. c) Data Link
NETWORKING CONCEPTS NANDI PU COLLEGE
Page 26